Hmm, I'm a bit unsure about this one. I know the different security principles, but I'm not 100% sure which one is best described by "ensuring data is accessed only by an authorized person."
I'm a little confused by the wording of these options. "Eliminate level cutters"? What does that even mean? I'll have to guess on this one and hope for the best.
Hmm, this is a tricky one. I need to think through the sequence of requirements, design, development, and testing. Let me re-trace the steps in my mind to make sure I get this right.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Evangelina
4 months agoTien
4 months agoMagnolia
4 months agoShaunna
4 months agoHerman
5 months agoAbel
5 months agoJani
5 months agoLang
5 months ago